Data privacy and security are critical components that ensure safe and ethical handling of data collected and processed from managed entities (devices and assets) in any IoT setup. In Zoho IoT, as part of privacy and security feature, we have integrated functionalities to comply with GDPR data protection requirements for PII (Personally Identifiable Information), along with data encryption, data slicing, password protection for files and more. This ensures legal adherence, safeguards user privacy, builds trust, prevents data breaches, and respects user rights.
This document on data protection provides an overview of the key security features and practices that safeguard customer data within the Zoho IoT application.
Image: Key data protection features in Zoho IoT
Understanding Data Privacy
Establishing Privacy with GDPR
GDPR emphasizes the protection of PII (Personally Identifiable Information). Any data that can uniquely identify an individual is considered PII, and safeguarding this information is essential for maintaining privacy and data security. GDPR, along with similar regulations, focuses on ensuring that personal information is properly protected.
PII Data Classification
In Zoho IoT, PII data is classified into two types: Sensitive(e.g., device identification number, driver license number, financial information, etc.) and Non-sensitive(e.g., name, address, date of birth, phone number). This classification is mostly used for segregation purposes.
PII Data in Custom Fields and Datapoints
While creating custom fields and datapoints in the application, you can configure to store them as PII data. You can also configure custom fields to encrypt and store the PII values when saving to servers, if required.
PII Data Restrictions
Administrators have options to control and limit your organization users' access to sensitive data related to your application's fields and datapoints.
You can configure the GDPR Settings from the General Data Protection Configuration Settings under Compliance Settings to restrict access to PII data.
Understanding Data Security
Security measures are essential for safeguarding sensitive data in the IoT application. Key security features like data encryption, data slicing, and password protection for files play a vital role in ensuring data security and preventing unauthorized access. Zoho IoT incorporates built-in features within the application to safeguard customer data, in addition to implementing security by design.
Device Data Encryption
Zoho IoT provides support for encrypting device data both in transit and at rest, using TLS 1.2/1.3 with Perfect Forward Secrecy and AES-256 respectively. For device communication, TLS authentication modes are available for communication with the cloud application.
Learn More
Password Protection
Support for file protection with a password is available for exported reports and device registration details. The passwords are provided by the user generating the report or registering the device, ensuring that sensitive reports are accessible only to authorized users.
Learn More
Access Control
Application owners can manage and restrict the amount of data that users added by them can access using the
Profiles and
Data slicing feature. They can establish a strong level of control over which users can view specific data.
Audit Log
Audit logs within the Zoho IoT application serve as a comprehensive record of all user and system activities, capturing detailed information about every action performed. These logs document key events such as user logins, data modifications, device interactions, and configuration changes, all recorded in a precise, chronological order.
Email Security
Zoho IoT provides security in email communications by providing customization options for the
sender's email address. This configuration helps to avoid mails landing in spam folders, thus securing emails.
Zoho Privacy and Security
Multi-Factor Authentication (MFA): In addition to the above features, Zoho provides account-based security using Multi-factor Authentication for sign-in. With MFA enabled in the Zoho account, users will be able to sign-in by verifying their identity using a password and an OTP received via an Email or SMS or Authentication app. This ensures that your account isn't accessed by any unknown users.
Refer to our company-wide Security and Compliance documents and the FAQ document on security for complete details.
https://www.zoho.com/security.html
https://www.zoho.com/compliance.html
https://www.zoho.com/security-faq.html
See Also